{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:37:52Z","timestamp":1742913472648,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319053011"},{"type":"electronic","value":"9783319053028"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05302-8_8","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:31:24Z","timestamp":1395325884000},"page":"122-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Software Camouflage"],"prefix":"10.1007","author":[{"given":"Sylvain","family":"Guilley","sequence":"first","affiliation":[]},{"given":"Damien","family":"Marion","sequence":"additional","affiliation":[]},{"given":"Zakaria","family":"Najm","sequence":"additional","affiliation":[]},{"given":"Youssef","family":"Souissi","sequence":"additional","affiliation":[]},{"given":"Antoine","family":"Wurcker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"key":"8_CR1","series-title":"LNCS","first-page":"307","volume-title":"ACNS 2003","author":"R Novak","year":"2003","unstructured":"Novak, R.: Side-channel attack on substitution blocks. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 307\u2013318. Springer, Heidelberg (2003)"},{"key":"8_CR2","series-title":"LNCS","first-page":"203","volume-title":"WISA 2003","author":"R Novak","year":"2004","unstructured":"Novak, R.: Sign-based differential power analysis. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol. 2908, pp. 203\u2013216. Springer, Heidelberg (2004)"},{"key":"8_CR3","unstructured":"Novak, R.: Side-Channel Based Reverse Engineering of Secret Algorithms. In: Zajc, B. (ed.) Proceedings of the Twelfth International Electrotechnical and Computer Science Conference (ERK 2003), pp. 445\u2013448. Ljubljana, Slovenia, Slovenska sekcija IEEE (2003)"},{"key":"8_CR4","series-title":"LNCS","first-page":"143","volume-title":"ICISS 2007","author":"Ch Clavier","year":"2007","unstructured":"Clavier, Ch.: An improved SCARE cryptanalysis against a secret A3\/A8 GSM algorithm. In: McDaniel, P., Gupta, S.K. (eds.) ICISS 2007. LNCS, vol. 4812, pp. 143\u2013155. Springer, Heidelberg (2007)"},{"key":"8_CR5","series-title":"LNCS","first-page":"393","volume-title":"ACNS 2005","author":"R Daudigny","year":"2005","unstructured":"Daudigny, R., Ledig, H., Muller, F., Valette, F.: SCARE of the DES. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 393\u2013406. Springer, Heidelberg (2005)"},{"key":"8_CR6","series-title":"LNCS","first-page":"527","volume-title":"OTM 2006 Workshops","author":"M Fournigault","year":"2006","unstructured":"Fournigault, M., Liardet, P.-Y., Teglia, Y., Tr\u00e9meau, A., Robert-Inacio, F.: Reverse engineering of embedded software using syntactic pattern recognition. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 527\u2013536. Springer, Heidelberg (2006)"},{"key":"8_CR7","series-title":"LNCS","first-page":"138","volume-title":"WISTP 2007","author":"D Vermoen","year":"2007","unstructured":"Vermoen, D., Witteman, M., Gaydadjiev, G.N.: Reverse engineering java card applets using power analysis. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 138\u2013149. Springer, Heidelberg (2007)"},{"key":"8_CR8","series-title":"LNCS","first-page":"110","volume-title":"SAC 2007","author":"F Amiel","year":"2007","unstructured":"Amiel, F., Feix, B., Villegas, K.: Power analysis for secret recovering and reverse engineering of public key algorithms. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 110\u2013125. Springer, Heidelberg (2007)"},{"key":"8_CR9","series-title":"LNCS","first-page":"218","volume-title":"CARDIS 2008","author":"D R\u00e9al","year":"2008","unstructured":"R\u00e9al, D., Dubois, V., Guilloux, A.-M., Valette, F., Drissi, M.: SCARE of an unknown hardware feistel implementation. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 218\u2013227. Springer, Heidelberg (2008)"},{"key":"8_CR10","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. http:\/\/www.springer.com\/ Springer, Heidelberg (2006). ISBN 0-387-30857-1"},{"key":"8_CR11","series-title":"LNCS","first-page":"413","volume-title":"CHES 2010","author":"M Rivain","year":"2010","unstructured":"Rivain, M., Prouff, E.: Provably secure higher-order masking of AES. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 413\u2013427. Springer, Heidelberg (2010)"},{"key":"8_CR12","unstructured":"Hsu, L.L., Joshi, R.V., Kruger, D.W.: Techniques for impeding reverse engineering (2011) IBM. Patent US 7994042 B2"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Brier, E., Fortier, Q., Korkikian, R., Magld, K.W., Naccache, D., de Almeida, G.O., Pommellet, A., Ragab, A.H., Vuillemin, J.: Defensive Leakage Camouflage. In: [33], pp. 277\u2013295","DOI":"10.1007\/978-3-642-37288-9_19"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/TC.2010.104","volume":"9","author":"S Guilley","year":"2010","unstructured":"Guilley, S., Sauvage, L., Flament, F., Hoogvorst, P., Pacalet, R.: Evaluation of power-constant dual-rail logics counter-measures against DPA with design-time security metrics. IEEE Trans. Comput. 9, 1250\u20131263 (2010). doi:10.1109\/TC.2010.104","journal-title":"IEEE Trans. Comput."},{"key":"8_CR15","unstructured":"Kessner, D.: Free VHDL 6502 core (2000) http:\/\/www.free-ip.com\/ is no longer available, but http:\/\/web.archive.org\/web\/20040603222048\/\u00a0http:\/\/www.free-ip.com\/6502\/index.html is"},{"key":"8_CR16","series-title":"LNCS","first-page":"30","volume-title":"CHES 2005","author":"W Schindler","year":"2005","unstructured":"Schindler, W., Lemke, K., Paar, Ch.: A stochastic model for differential side channel cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30\u201346. Springer, Heidelberg (2005)"},{"key":"8_CR17","unstructured":"Marion, D., Wurcker, A.: Read, Write Signals Reconstruction Using Side Channel Analysis for Reverse Engineering, : COSADE, 2013. Short talk, TELECOM-ParisTech, Paris, France (2013)"},{"key":"8_CR18","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-14712-8_17","volume-title":"LATINCRYPT 2010","author":"S Guilley","year":"2010","unstructured":"Guilley, S., Sauvage, L., Micolod, J., R\u00e9al, D., Valette, F.: Defeating any secret cryptography with SCARE attacks. In: Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. LNCS, vol. 6212, pp. 273\u2013293. Springer, Heidelberg (2010)"},{"key":"8_CR19","series-title":"LNCS","first-page":"227","volume-title":"WISA 2007","author":"E Prouff","year":"2008","unstructured":"Prouff, E., Rivain, M.: A generic method for secure SBox implementation. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol. 4867, pp. 227\u2013244. Springer, Heidelberg (2008)"},{"key":"8_CR20","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TC.2004.13","volume":"53","author":"B Chevallier-Mames","year":"2004","unstructured":"Chevallier-Mames, B., Ciet, M., Joye, M.: Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity. IEEE Trans. Comput. 53, 760\u2013768 (2004)","journal-title":"IEEE Trans. Comput."},{"key":"8_CR21","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-642-34961-4_44","volume-title":"ASIACRYPT 2012","author":"N Veyrat-Charvillon","year":"2012","unstructured":"Veyrat-Charvillon, N., Medwed, M., Kerckhof, S., Standaert, F.-X.: Shuffling against side-channel attacks: a comprehensive study with cautionary note. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 740\u2013757. Springer, Heidelberg (2012)"},{"key":"8_CR22","volume-title":"Chapter of the Monography Boolean Models and Methods in Mathematics, Computer Science, and Engineering","author":"C Carlet","year":"2010","unstructured":"Carlet, C.: Boolean functions for cryptography and error correcting codes. In: Crama, Y., Hammer, P. (eds.) Chapter of the Monography Boolean Models and Methods in Mathematics, Computer Science, and Engineering. cambridge University Press, Cambridge (2010). http:\/\/www.math.univ-paris13.fr\/carlet\/chap-fcts-Bool-corr.pdf"},{"key":"8_CR23","series-title":"LNCS","first-page":"250","volume-title":"CHES 2013","author":"DJ Bernstein","year":"2013","unstructured":"Bernstein, D.J., Chou, T., Schwabe, P.: McBits: fast constant-time code-based cryptography. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 250\u2013272. Springer, Heidelberg (2013)"},{"key":"8_CR24","series-title":"LNCS","first-page":"95","volume-title":"CHES 2011","author":"HS Kim","year":"2011","unstructured":"Kim, H.S., Hong, S., Lim, J.: A fast and provably secure higher-order masking of AES S-Box. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 95\u2013107. Springer, Heidelberg (2011)"},{"key":"8_CR25","series-title":"LNCS","first-page":"252","volume-title":"CHES 2000","author":"C Clavier","year":"2000","unstructured":"Clavier, C., Coron, J.-S., Dabbous, N.: Differential power analysis in the presence of hardware countermeasures. In: Paar, C., Ko\u00e7, C. (eds.) CHES 2000. LNCS, vol. 1965, pp. 252\u2013263. Springer, Heidelberg (2000)"},{"key":"8_CR26","series-title":"LNCS","first-page":"171","volume-title":"CHES 2009","author":"M Rivain","year":"2009","unstructured":"Rivain, M., Prouff, E., Doget, J.: Higher-order masking and shuffling for software implementations of block ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 171\u2013188. Springer, Heidelberg (2009)"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Durvaux, F., Renauld, M., Standaert, F.X., van Oldeneel tot Oldenzeel, L., Veyrat-Charvillon, N.: Efficient removal of random delays from embedded software implementations using hidden markov models. In: [33], pp. 123\u2013140","DOI":"10.1007\/978-3-642-37288-9_9"},{"key":"8_CR28","unstructured":"TELECOM ParisTech SEN research group: DPA Contest (4th edn.) (2013\u20132014). http:\/\/www.DPAcontest.org\/v4\/"},{"key":"8_CR29","unstructured":"RCIS-AIST, J.: SASEBO (Side-channel Attack Standard Evaluation Board, Akashi Satoh) development board: http:\/\/www.risec.aist.go.jp\/project\/sasebo\/ (2013)"},{"key":"8_CR30","series-title":"LNCS","first-page":"16","volume-title":"CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004)"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Bhasin, S., Danger, J.L., Guilley, S., Najm, Z.: A low-entropy first-degree secure provable masking scheme for resource-constrained devices. In: Proceedings of the Workshop on Embedded Systems Security, WESS \u201913. ACM, New York (2013)","DOI":"10.1145\/2527317.2527324"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer (2002)","DOI":"10.1007\/978-3-662-04722-4_1"},{"key":"8_CR33","series-title":"LNCS","volume-title":"CARDIS 2012","year":"2013","unstructured":"Mangard, S. (ed.): CARDIS 2012. LNCS, vol. 7771. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05302-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T22:53:22Z","timestamp":1676847202000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-05302-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319053011","9783319053028"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05302-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}